throbber
US009057210B2
`
`(12) United States Patent
`Dumas et al.
`
`(10) Patent No.:
`
`(45) Date of Patent:
`
`US 9,057,210 B2
`Jun. 16, 2015
`
`(54)
`
`(71)
`
`(72)
`
`(73)
`
`(*)
`
`(21)
`
`(22)
`(65)
`
`(63)
`
`(60)
`
`(51)
`
`WIRELESS ACCESS CONTROL SYSTEM AND
`RELATED METHODS
`
`Applicant: Unikey Technologies, Inc., Orlando, FL
`(US)
`Philip C. Dumas, Orlando, FL (US);
`Thomas Bennett, Maitland, FL (US)
`
`Inventors:
`
`Assignee: Unikey Technologies, Inc., Orlando, FL
`(US)
`
`Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. l54(b) by 106 days.
`Appl. No.: 13/734,671
`
`Filed:
`
`Jan. 4, 2013
`Prior Publication Data
`
`US 2013/0176107A1
`
`Jul. 11,2013
`
`Related U.S. Application Data
`
`Continuation-in-part of application No. 13/415,365,
`filed on Mar. 8, 2012.
`
`Provisional application No. 61/453,737, filed on Mar.
`17, 201 1.
`
`Int. Cl.
`
`G05B 23/00
`B60R 25/00
`
`(2006.01)
`(2013.01)
`(Continued)
`
`U.S. Cl.
`
`(52)
`
`(58)
`
`CPC .......... .. E05B 47/00 (2013.01); G07C 9/00309
`(2013.01); G07C 9/00103 (2013.01);
`(Continued)
`Field of Classification Search
`CPC ............... .. G07C 2009/00793; G07C 2209/04;
`G07C 2209/64; G07C 9/00571; G07C
`9/00174; G07C 2209/08; G07C 2209/62;
`G07C 9/00309; G07C 2009/00365; G07C
`2009/64; G07C 9/0057; G07C 2009/00507;
`G07C 9/00103; G07C 9/00087; G07C
`9/00182; G07C 9/00563; G07C 2209/63;
`
`G07C 9/00904; G07C 9/0018; G07C
`2009/00785; G07C 2009/00825; G07C
`2009/00865; G07C 9/00023; G07C 9/00111;
`G07C 2209/00365; G07B 15/063; G07B
`15/00; H04W 12/00; H04W 12/06; B65D
`90/023; B65D 90/024; E04H 7/30; H01H
`85/10; B62H 5/14; B62H 5/20; E05B 15/101;
`E05B 47/0002; E05B 47/00; H04L 63/0428;
`H04L 63/0492
`USPC ....... .. 340/5.61, 10.3, 10.33, 10.34, 5.1, 5.72,
`340/539.21, 539.23, 5.27, 5.64, 5.71, 5.2,
`340/426.28, 539.11, 542, 825.31, 572.9;
`455/343, 404.1, 414.1, 556.1;
`70/279.1, 224, 278.2, 277, 9, 21,
`70/278.1; 726/17, 19
`See application file for complete search history.
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`6,072,402 A *
`6/2000 Kniffin et al.
`.............. .. 340/5.28
`6,236,333 B1
`5/2001 King
`
`(Continued)
`
`FOREIGN PATENT DOCUMENTS
`
`CN
`JP
`
`101532353
`2000145222
`
`9/2009
`5/2000
`
`(Continued)
`OTHER PUBLICATIONS
`International Search Report of corresponding PCT/US2013/059699.
`(Continued)
`
`Primary Examiner — Mirza Alarn
`(74) Attorney, Agent, or Firm — Allen, Dyer, Doppelt,
`Milbrath & Gilchrist, P.A.
`
`ABSTRACT
`(57)
`A wireless access control system includes a remote access
`device and an electronic lock. The electronic lock communi-
`cates with the remote access device. The electronic lock con-
`trols the ability to lock and unlock a door in which the elec-
`tronic lock is disposed. The electronic lock determines when
`the remote access device is at a distance less than or equal to
`a predetermined distance from the lock to enable the lock to
`be unlocked.
`
`45 Claims, 15 Drawing Sheets
`
`
`
`ASSA 1001
`
`1
`
`ASSA 1001
`
`

`
`US 9,057,210 B2
`Page 2
`
`(51)
`
`Int. Cl.
`B60R 25/10
`E053 49/00
`E053 47/00
`G07C 9/00
`
`(2013.01)
`(200501)
`(2006.01)
`(2006.01)
`
`(52) US‘ C1‘
`CPC .. G07C9/00571 (2013.01); G07C 2009/00793
`(2013.01);G07C2209/04(2013.01);G07C
`2209/64 (2013.01)
`
`(56)
`
`References Cited
`
`US. PATENT DOCUMENTS
`
`7,173,516 B2
`7,701,331 132*
`2002/0013909 A1
`2003/0222758 A1
`2006/0164208 A1
`
`2008/0117176 A1
`2008/0231433 A1
`2008/0238610 A1
`2009/0002153 A1*
`2009/0066476 A1*
`2010/0052931 A1
`
`2/2007 Mullet et al.
`4/2010 Tran ......................... .. 340/539.1
`1/2002 Baumeisteretal.
`12/2003 Willatsetal.
`7/2006 Schaffzin etal.
`
`5/2008 Ko et al.
`9/2008 McBride et al.
`10/2008 Rosenberg
`.......... .. 340/539.11
`1/2009 Berstisetal.
`3/2009 Raheman ................... .. 340/5.64
`3/2010 Kolpasky et al.
`
`3/2010 Thomas et al.
`2010/0059231 A1
`7/2010 Sharma et al.
`2010/0164683 A1
`8/2010 Robertson et al.
`2010/0201536 A1*
`9/2010 Ghabra etal.
`2010/0245038 A1
`12/2010 Ullmann
`2010/0306549 A1
`9/2011 Kojima et al.
`2011/0223868 A1
`9/2012 Neil et al.
`2012/0234058 A1
`10/2012 Hanover
`2012/0258681 A1
`2012/0230733 A1* 11/2012 Ger11ard1e1a1,
`2013/0241694 A1
`9/2013 Sharmaetal.
`
`....... .. 340/686.6
`
`............. ,, 340/55
`
`FOREIGN PATENT DOCUMENTS
`
`JP
`KR
`KR
`
`KR
`KR
`KR
`W0
`W0
`
`2003262072
`1020030083538
`20040093937 A
`
`9/2003
`10/2003
`11/2004
`
`20050005785 A
`1020080085523
`2020100001205
`W0 2011159921 A1
`2012054253
`
`1/2005
`9/2008
`* 22010
`12/2011
`5/2012
`
`Written Opinion and International Search Report of PCT/US2013/
`059695.
`
`* cited by examiner
`
`2
`
`

`
`U.S. Patent
`
`Jun. 16,2015
`
`Sheet 1 of 15
`
`US 9,057,210 B2
`
`
`
`
`
`Eoumzwmmmuoa.wmm.m.__..,>
`
`
`
` cowmo__n_n_<Wmega.wm¢8<90Emm
`
`
`
`E5c_m_._Ehmwsom
`
`h0:Oh.r_OU
`
`mcfioewoa
`
`$>_mumm
`
`
`
`..owwmoo._&firmaom
`
`eonmo__&m
`
`vtoémz
`
`cmc._mE_v
`
`mm
`
`mm
`
`
`
`._,_onuwmm_
`
`co_..moM_aa<
`
`.§.mEo._m_woo<
`
`b._E_xo._n_
`
`Lofimfia
`
`em.as
`
`
`
`#5...E<,
`
`H:o_.§._E2S<
`
`,::o..._0
`
`
`
`wmm_mESH.1._m__o._Eoo
`:oswu_c:EEo0
`
`3
`
`
`
`

`
`U.S. Patent
`
`Jun. 16,2015
`
`Sheet 2 of 15
`
`US 9,057,210 B2
`
`\
`
`13:
`
`14»
`
`:4
`
`4
`
`

`
`U.S. Patent
`
`Jun. 16, 2015
`
`Sheet 3 of 15
`
`US 9,057,210 B2
`
`FIG. 3a
`
`5
`
`

`
`U.S. Patent
`
`Jun. 16,2015
`
`Sheet 4 of 15
`
`US 9,057,210 B2
`
`FIG.4
`
`6
`
`

`
`U.S. Patent
`
`Jun. 16, 2015
`
`Sheet 5 of 15
`
`US 9,057,210 B2
`
`7
`
`

`
`U.S. Patent
`
`Jun. 16, 2015
`
`Sheet 6 of 15
`
`US 9,057,210 B2
`
`101
`
`
`Access Elaulces
`
`Lock Low Power broadcast
`Mod9 (Looking for Re moie
`
`FIG. 6a
`
`102
`
`User Touches lha Lack
`
`(Lock Wakes Up)
`
`103
`
`Listen for bioadcasis from
`Fob and increase broadcasl
`
`rale 10 as iasl as possibte
`
`
`Adverlisemenl
`DBU was
`
`
`lrom lob recieved
`lnuched again
`(withln x sec}
`(within x sec}?
`
`Phone ccmneclahle
`
`advaxfisament response
`(within at sec)
`
`_
`
`124
`
`_
`
`360
`
`
`
`G0 to
`Phflnfl 7'99
`-
`
`
`
`
`
`
`
`
`F8 {Ob
`aulhorized at
`
`N
`
`lhls tlme?
`
`Y
`
`Connect lo Fob
`
`109
`
`
`Exponenliai Back-
`ofll secusity ignore
`
`
`1 To
`
`
`
`Is the Lock
`Unlocked?
`
`Y _
`
`11:
`
`Lock iouched
`a ihlrd lime
`in < x $60?
`
`8
`
`

`
`U.S. Patent
`
`Jun. 16, 2015
`
`Sheet 7 of 15
`
`US 9,057,210 B2
`
`FIG. 6b
`
`LOCK DOOT
`
`Fob
`connection
`timeout?
`
`Chatlange
`tesponse fob
`
`Challenge
`Response OK?
`
`
`
`
`
`
`
`Exponanttat Back-
`oftl security Ignore
`Gather externai and
`
`Internal antenna RS8! and
`um through location +
`Position atgostlhm
`
`
`
`is user in
`
`
`Activation
`range?
`
`
`
`
`Lockiuntcck Door
`(Opposite ot cuuent stale)
`
`Disconnect from FOB
`
`9
`
`

`
`U.S. Patent
`
`Jun. 16, 2015
`
`Sheet 8 of 15
`
`US 9,057,210 B2
`
`FIG. 60
`
`
`
`Phone In
`range - Hespondes
`lo lock broadcast
`
` 13 phone
`authorized at
`lnis time’?
`
`
`
`Connect Io
`
`phone - Chalfenge
`Hespransa (Jock to phone)
`
`Chailenge
`
`Response OK’?
`
`
` Exponenliai
`Back-off! securily ignore -
`
`
`
`
`
`Galher external and
`
`internal antenna H38! and
`run through locafion
`
`
`
`atgrollhm
`Wakeup Touch)
`
`Has Bullun Bear:
`Pressed? (Includes
`
`
`
`10
`
`10
`
`

`
`U.S. Patent
`
`Jun. 16, 2015
`
`Sheet 9 of 15
`
`US 9,057,210 B2
`
`is user In
`Aclivaflon range?
`
`
`
`unrockflock
`
`{based on boll posillon}
`
`is ihis a one
`time key?
`
`
`
`Defele Key
`from Database
`
`
`
`11
`
`11
`
`

`
`U.S. Patent
`
`Jun. 16, 2015
`
`Sheet 10 of 15
`
`US 9,057,210 B2
`
`FIG. 7a
`
`12
`
`

`
`U.S. Patent
`
`Jun. 16,2015
`
`Sheet 11 of 15
`
`US 9,057,210 B2
`
`FIG. 7b
`
`Door
`
`90
`
`Activation Fiange
`
`92
`
`
`)insignal Range (Not Active
`lwsignai Range
`91
`“J K“
`
`Activation Range: ~ 3 feet away
`in-signai range: Maximum dislance for communication
`
`13
`
`13
`
`

`
`U.S. Patent
`
`Jun. 16,2015
`
`Sheet 12 of 15
`
`US 9,057,210 B2
`
`FIG. 8
`
`
`
`14
`
`14
`
`

`
`U.S. Patent
`
`Jun. 16, 2015
`
`Sheet 13 of 15
`
`US 9,057,210 B2
`
`ex.93
`
`wccmE<
`
`._mwmEo._m_moo<
`
`co_.fio€m£:<
`
`\
`
`15
`
`15
`
`
`
`

`
`U.S. Patent
`
`uJ
`
`51:1041tw
`
`US 9,057,210 B2
`
`
`
`.s/.HH50..wmtmtwmB__o.E._oo53ofiobomm
`0JH.2,M..
`h000..IN:
`
`figsmmmWn.E.3.
`
`16
`
`e~.©~.u~
`
`_,WKmmomKmm:9
`
`:o.e8_EEE<
`
`.
`
`mmhm[Vm/Noo_.Kmm
`
`16
`
`
`
`

`
`U.S. Patent
`
`Jun. 16, 2015
`
`Sheet 15 of 15
`
`US 9,057,210 B2
`
`FIG. 11
`
`17
`
`17
`
`

`
`US 9,057,210 B2
`
`1
`WIRELESS ACCESS CONTROL SYSTEM AND
`RELATED METHODS
`
`CROSS REFERENCE TO RELATED
`
`APPLICATION(S)
`
`This application is a continuation-in-part of copending
`U.S. application Ser. No. 13/415,365, filed Mar. 8, 2012,
`which claims the benefit of Provisional Patent Application
`No. 61/453,737, filed Mar. 17, 2011, in its entirety and is
`hereby incorporated by reference.
`
`FIELD OF THE INVENTION
`
`The present invention generally relates to access control
`systems, and more particularly, to wireless access control
`systems for door locks.
`
`BACKGROUND
`
`A passive keyless entry (PKE) system offers an increased
`level of convenience over a standard lock and key, for
`example, by providing the ability to access a secure building
`or device without having to find, insert, and turn a traditional
`key. A user may simply approach and touch a locked PKE
`lock and with little if any pause, the lock grants this user
`access if they are carrying an authorized token.
`A PKE system is currently used in an automotive applica-
`tion and may offer increased convenience by identifying driv-
`ers and unlocking the car as they approach and grab the
`handle. Automotive access is traditionally given by inserting
`a key into the lock or by pushing buttons on a traditional
`remote keyless entry (RKE) system. In contrast, a PKE sys-
`tem grants access with reduced user interaction through the
`use of a hands free token carried by the driver.
`Several technical challenges have been encountered during
`the engineering of a radio frequency (RF) PKE system, for
`example, for use in a residential lock. The desired basic
`perceived behavior of the PKE system in a residential appli-
`cation may be as follows: 1) the user approaches and touches
`the lock; 2) the lock authenticates the user with a minimally
`perceived delay; 3) the lock unlocks; 4) the lock may not
`operate if the authorized user is outside a desired range and
`the lock is touched by another, unauthorized, user; 5) the lock
`may not operate if the authorized user is on the inside of the
`house, and the lock is touched on the outside by an unautho-
`rized user; and 6) the battery powered lock needs several
`months or more worth of battery life to prevent inconvenient
`and costly battery changes. 7) if a PKE fob is used, battery
`power needs to be over a year. 8) the lock can provide any-
`time, or configurable limited time, access control. 9) the lock
`has the ability to be locked without a remote access device
`Indeed, as will be appreciated by those skilled in the art,
`with respect to the above desired basic perceived behavior of
`the PKE system in a residential application, primary chal-
`lenges to be addressed include items 1 (Simplicity), 2 (speed),
`4 (distance), 5 (location), 6-7 (battery life), and 8-9 (conve-
`nience). Accordingly, it may be desirable to improve authen-
`tication speed, proximity measurement, location determina-
`tion, decrease power consumption, and increase convenience
`for example.
`
`SUMMARY OF THE INVENTION
`
`A wireless access control system includes a remote access
`device for authorizing access control to a lock when present
`on a user who touches, or triggers a proximity detector, of the
`lock.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`2
`
`A wireless access control system includes a remote access
`device for authorizing access control to a lock when the user
`possessing the authorized remote access device is within an
`activation range of the lock and door. If the authorized user is
`outside of activation range, signal range, or inside the lock
`and door, the remote access device will not be enabled to lock
`or unlock the door.
`
`A wireless control system includes a remote access device
`for accessing a lock. The remote access device includes a
`controller and radio signal generator. A battery powers the
`controller and radio signal generator. An accelerometer pro-
`vides an acceleration signal to the controller in response to
`sensed acceleration. The radio signal generator outputting a
`radio signal for a predetermined time period in response to an
`acceleration signal via the controller. In a preferred embodi-
`ment, an authentication circuit provides an input to the con-
`troller for encryption and authentication purposes which are
`carried by the radio signal to the lock.
`In another embodiment, the remote access device can be a
`Smartphone. In another embodiment, additional haptic feed-
`back can be utilized to control the electronic lock. A user can
`
`tap the remote access device if within activation range to
`cause a larger acceleration trigger which can be captured by
`the controller and sent to the lock via a radio signal to lock or
`unlock the electronic lock in response.
`In another embodiment, a lock includes a controller and
`radio signal transceiver to communicate with an electronic
`lock for controlling the electronic lock in response to the
`signal from the remote access device. The lock includes an
`accelerometer for determining movement, such as a knock or
`the door opening, in which the lock is disposed and control-
`ling the radio or the electronic lock via the controller as a
`function of the acceleration signal.
`In another embodiment, a real time clock provides a clock
`input to the controller, the controller allowing for config-
`urable access control ofthe electronic lock as a function ofthe
`
`time indicated by a signal from the real time clock. The
`controller operating on the real time clock signal can permit
`anytime, limited time, recurring time windows, or one-time
`use access for example.
`In another embodiment, a proximity detector which detects
`the presence of a user at or near the lock provides a proximity
`detection signal to the controller and radio for permitting
`control of the electronic lock in response to a signal from a
`remote access device when the proximity of a user is detected.
`In one embodiment, the proximity detector may be a touch
`sensor disposed within the lock or a trip light detector. In one
`embodiment, the trip light detector is located at the bottom of
`a deadbolt lock facing downwards towards the handle so
`when a user grabs the handle of the door the light detector is
`tripped and the deadbolt controller can initiate the desired
`action, for example unlocking the deadbolt.
`In another embodiment, the proximity detector can be
`intentionally triggered “n” times in a row within a predeter-
`mined time period, or be continuously held for a predeter-
`mined time period (the time period preferably being ten or
`fewer seconds) to trigger a lock event without a remote access
`device being present.
`the proximity detector which
`In another embodiment,
`detects the presence of a user at or near the lock provides a
`proximity detection signal to the controller and radio to turn
`on or change the state of the radio in order to make a connec-
`tion with an authorized remote access device and lock or
`
`unlock the electronic lock. In a preferred embodiment, the
`proximity detection activates the radio into a listening state
`for a limited period oftime to listen for remote access devices
`advertisements. This listening state requires more power
`
`18
`
`18
`
`

`
`US 9,057,210 B2
`
`3
`there for it is desirable to only go into this state for a limited
`period of time upon user detection.
`In another embodiment, the lock is already communicating
`with an authorized remote access device and the proximity
`detector which detects the presence of a user at or near the
`lock provides a proximity detection signal to the controller to
`lock or unlock the electronic lock.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`FIG. 1 is a schematic diagram of a wireless access system
`according to the present invention;
`FIG. 2a is a perspective view of a lock constructed in
`accordance with the invention;
`FIG. 2b is a perspective view of a lock constructed in
`accordance with another embodiment of the invention;
`FIG. 3a is a top plan view of a remote access device
`constructed in accordance with the invention as a key;
`FIG. 3b is a front plan view of a remote access device
`constructed in accordance with yet another embodiment of
`the invention as an application for a cell phone;
`FIG. 4 is a front plan view of a Router Plug-in Unit of the
`wireless access system constructed in accordance with the
`invention;
`FIG. 5 is a schematic diagram of the communication
`between the components of the wireless access system in a
`typical residential system layout
`in accordance with the
`invention;
`FIG. 6a-6d are a flow chart of operation of the wireless
`access system in accordance with the invention;
`FIG. 7a is a diagram of a system showing the local com-
`munication between the remote access and the lock in accor-
`dance with the invention;
`FIG. 7b is a diagram of a system showing range and loca-
`tion determination in accordance with the invention;
`FIG. 8 is a diagram of a system showing the method of
`sending access control authorization from one remote access
`device to another in accordance with the invention;
`FIG. 9 is a circuit diagram of a remote access device con-
`structed in accordance with still another embodiment of the
`invention;
`FIG. 10 is a circuit diagram of a PKE lock constructed in
`accordance with another embodiment of the invention; and
`FIG. 11 is a schematic diagram of a trip light circuit for
`sensing the presence of a user in accordance with the inven-
`tion.
`
`DETAILED DESCRIPTION OF THE INVENTION
`
`The present description is made with reference to the
`accompanying drawings, in which various embodiments are
`shown. However, many different embodiments may be used,
`and thus the description should not be construed as limited to
`the embodiments set forth herein. Rather, these embodiments
`are provided so that this disclosure will be thorough and
`complete. Like numbers refer to like elements throughout,
`and prime notation is used to indicate similar elements or
`steps in alternative embodiments.
`Referring to FIGS. 1, 2a, 2b, 3a, 3b, and 4, a wireless
`access system 10, for example, a PKE system, includes a lock
`11. The lock 11 may be installed in a standard deadbolt hole
`and may be battery powered, for example. The lock 1 1 may be
`a human controlled (keyed) lock, for example (FIG. 2a). The
`lock 11 includes an outer cylinder 12 that rotates freely
`around a standard key cylinder 13. When engaged, the cylin-
`der 13 is linked to a deadbolt 14 (which may optionally be part
`oflock 11), thus giving the user control to extend or retract the
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`4
`
`deadbolt utilizing their key. The lock 11 includes a controller
`21 or processor and wireless communication circuitry 22 for
`wireless communication which as will be discussed below,
`enable remote access device 15 to operate lock 11.
`Alternatively, in another embodiment, the lock 11' may be
`motor powered (FIG. 2b). When a user is in sufficiently close
`vicinity or touches anywhere on the lock, or in proximity of
`the lock, 11', the deadbolt 14' is driven by the motor (not
`shown) to open the lock for authorized users having the
`remote access device 15. Of course, the lock 11 may be
`another type of lock or locking mechanism and may be
`installed in any access point, for example.
`Lock 11 includes a proximity detector 27 for detecting the
`presence of a user. Proximity detector 27 outputs a presence
`signal in response to detecting a user. As discussed below,
`proximity detector 27 may be a capacitance touch sensor, a
`button, a trip light circuit, a near field detector, a radio fre-
`quency signal strength detector, an audio switch (which actu-
`ates upon receipt of audio signals of a set frequency), or the
`like. Proximity detector 27 outputs the presence signal to
`controller 21.
`
`In one non-limiting exemplary embodiment, lock 11 is in a
`hibernation or low power level state. Upon triggering a prox-
`imity detector 27 outputting the presence signal by a users
`touch for example, controller 21 causes system 10 to wake up
`and start listening for remote access devices 15 advertise-
`ments. Upon finding a remote access device 15, the lock 11
`communicates with (connects) to the remote access device
`15, determines if the device 15 is an authorized user via an
`encrypted key exchange, then determines ifthe remote access
`device 15 is in range to control the lock 11, and ultimately
`provides access to an authorized user; all within a short or
`small perceived delayed time (ten seconds or less) if all the
`criteria is met.
`
`Additionally, the lock 11 may be advertising or listening
`(sending or sampling signals) at a low frequency rate in order
`to conserve battery power yet establish a communication link
`with the remote access device 15 in advance of a users touch.
`
`In this way, increasing the speed ofthe authentication process
`to create little if any perceived delay for the user.
`In another embodiment, once the lock 11 is touched by a
`user, the lock wireless communication circuitry 22 changes
`states and starts listening for a remote access device 15 adver-
`tisement. Once a connection is made authentication can be
`
`done upon connection, or upon lock or unlock request from
`remote access device 15. Once authenticated, the lock 11
`tracks the Received Signal Strength Indicator (RSSI) of the
`remote access device until the algorithm determines it is
`within a defined accessible range from lock 11. The lock 11
`gathers RSSI data and utilizes this data in an algorithm to
`determine the position of the remote access device 15. Once
`the remote access device 15 is within a pre-determined acces-
`sible distance (control range), the lock grants remote access
`device 15 access control to lock or unlock the lock 11. Addi-
`
`tional antennas may be used in some embodiments for more
`accurate position determining, and to increase authorized
`user capacity and overall speed of the wireless access system
`10,
`Alternatively, in another embodiment, the lock may be a
`doorknob lock, handle lock, or other style lock for example.
`Referring now additionally to FIG. 3, the wireless access
`system 10 includes a remote access device 15. The remote
`access device 15 is advantageously a key or token authorized
`to control the lock 11. In particular, the remote access device
`15 may be a standard key including a controller 16 for con-
`trolling lock 11 via remote wireless access electronics
`coupled thereto (FIG. 3a). Remote access device 15 also
`
`19
`
`19
`
`

`
`US 9,057,210 B2
`
`5
`includes wireless communication circuitry radio 18 such as a
`radio in one non-limiting embodiment, for sending and
`receiving signals. In a preferred non-limiting example, the
`signal is a Bluetooth Low Energy signal.
`Alternatively, or additionally, the remote access device 15
`may be a mobile wireless communications device, such as,
`for example, a Smartphone that may include the remote wire-
`less access electronics described above cooperating with an
`application 17' stored in memory 17 (FIG. 3b). The applica-
`tion 17' may be configured to send a signal to provide access
`and control over the lock 11', for example. Of course, more
`than one remote access device 15' may be used and may be
`another type of remote access wireless device, for example, a
`wireless FOB without the mechanical key, as will be appre-
`ciated by those skilled in the art.
`Referring now additionally to FIG. 4, the wireless access
`system 10 also includes a Router Plug-in Unit (RPU) 30.
`Connected to mains power via a power source plug-in 38 and
`the Internet via a Ethernet port 37 to the home router. A
`controller 32 controls operation of RPU 30. In one embodi-
`ment, the RPU 30 includes a radio transceiver 33 to commu-
`nicate with lock 11 and/or remote access device 15, and
`utilizes a Bluetooth Low Energy communication protocol to
`communicate with the lock 11.
`
`The RPU 30 may link to an off-site web-based server 34 via
`a communications network such as the internet 28, for
`example. This advantageously enables RPU 30 to receive
`near real time updates for adding or removing users, one-time
`access, extended access or specific timed access, and other
`connectivity related updates and functions at lock 11, as will
`be appreciated by those skilled in the art. In addition, the RPU
`30 can send lock 11 status and transaction updates via the
`Internet 28 to the server 34 which can be viewed on a remote
`
`access device 15 or personal computer 25, for example. Addi-
`tional services may be selectively provided via the Internet
`using the connectivity of RPU 30 with server 34, for example.
`While the RPU 30 is described herein as a plugin device, it
`will be appreciated by those skilled in the art that the func-
`tionality of the RPU 30 may be embodied in any of a number
`of form factors, for example, such as a mobile cellular based
`unit making use of cell network 35.
`Referring now additionally to FIG. 5, a typical residential
`setup example of the wireless access system 10 is illustrated.
`As described above with respect to FIG. 4, the RPU 30 is
`typically plugged-in to the mains power via power source
`plug-in 38 and to the internet 28 via the home router though an
`Ethernet cable and port 37, at a location near the home router.
`RPU 30 may also communicate wirelessly to the lock 11,
`which may be installed on the front door, for example.
`Operation of the wireless access system 10 will now be
`described with reference additionally to the flowchart in FIG.
`6a-6d. The lock 11, may initially be in a low power mode in
`a step 101 to conserve battery power, for example. The lock
`11 is typically in a low power mode; searching for authorized
`remote access devices 15', for example a Smartphone, at a
`lower frequency to conserve battery power, In one preferred
`non-limiting embodiment, when a user triggers the proximity
`detector 27 by touch in a Step 102, or another method, the
`lock 11 begins to listen for remote access devices 15 in a Step
`103, more specifically fobs in this embodiment. At the same
`time, system 10 powers up and controller 2 increases its
`broadcast and listening rate.
`If lock 11 “sees” (receives) an advertisement from a fob 15
`within a predetermined time period in a Step 104, and the fob
`15 is authorized for access at that time as determined by lock
`11 in a step 107, a connection is made between fob 15 and
`lock 11 in a step 110. It is then determined whether fob 15 is
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`6
`still connected by determining whether communication has
`occurred within a predetermined time period in a Step 112.
`If the fob 15 has not timed out, then in a Step 114 a lock 11
`performs a challenge response verification process to authen-
`ticate the remote access device 15. If fob 15 is verified by
`comparing an identification portion of the advertisement sig-
`nal to information stored at system 10, lock 11 begins to
`gather and process location and positioning data of fob 15 in
`a step 117 utilizing Received Signal Strength Indication
`(RSSI) by way of non-limiting example. Utilizing the loca-
`tion and positioning algorithm in step 117, lock 11 can deter-
`mine if the user is within activation range in step 118. If the
`user is in the activation range as determined in step 118, the
`control of lock 11 is given to fob 15 and the lock 11 will lock
`or unlock as needed in a step 119, then the lock 11 disconnects
`from fob 15 in a step 120 and returns to step 100 to its low
`power state 101.
`If in Step 104 the advertisement from the fob 15 is not
`received within a predetermined time window or the fob is not
`authorized as determined in Steps 107 and a Step 109 in
`which the signal is ignored, or the fob connection times out in
`a Step 112, or the challenge response in Step 115 is not an
`appropriate one, then the process returns to Step 100 to be
`repeated.
`In another embodiment, controller 21 can enable locking
`the door without the use of fob 15. If proximity detector 27,
`which may include a touch sensor, determines that lock 11
`was touched at least a second time within a time window,
`preferably measured in seconds, in a Step 106, then controller
`21 determines whether lock 11 is unlocked in a step 108. If it
`is determined that lock 11 is in fact unlocked in Step 108, then
`it is determined whether or not or not the lock 11 is touched a
`
`third time within a predetermined time window measured in
`seconds or less, and if in fact the lock 1 1 is touched three times
`within the time window, then controller 21 causes lock 11 to
`lock bolt 14 in a Step 113 and the process is returned to the
`beginning in Step 100 to monitor for another remote access
`device 15. If the deadbolt is not touched the prescribed num-
`ber of times during the time window, in Steps 106 and 111, or
`is already in the locked state as determined in Step 108, then
`the process returns to Step 100 to await connection with
`another remote access device. In this way, a door can be
`locked merely by activating proximity detector 27, a prede-
`termined number of times within a predetermined time
`period, or by continuously activating proximity detector 27
`for a predetermined time period.
`In another embodiment, the system may work without the
`need to touch lock 11 in step 102. In this embodiment, lock 11
`and remote access device 15 determine that they are within
`range of each other to begin processing without the need to
`initially touch lock 11. This allows for the control of lock 11
`well ahead of being sufficient proximity of a door to touch
`lock 11.
`
`In this preferred non-limiting embodiment, an in-range
`remote access device 15', such as a Smartphone, responds in
`a Step 121 to a broadcast advertisement from the lock 11 in a
`Step 121 by controller 21. If the Smartphone 15' is authorized
`for access at that time as determined by controller 21 in a Step
`122, a connection is made in a Step 124 between a Smart-
`phone 15' and lock 11. If Smartphone 15' is authenticated
`during a challenge response verification process in Step 125,
`lock 11 begins to gather and process location and positioning
`data in a Step 127, utilizing RSSI or a signal from Global
`Positioning System (GPS) enabled Smartphone 15,
`for
`example. Utilizing the location and positioning algorithm in
`Step 127, the lock 11 can determine ifthe user is in activation
`range in a Step 129. In an optional Step 128, lock 11 may
`
`20
`
`20
`
`

`
`US 9,057,210 B2
`
`7
`determine whether lock 11 has been touched prior to deter-
`mining whether the user is in range in Step 129. If the user is
`in activation range, lock 11 will lock or unlock (reverse state)
`in a Step 130.
`In another embodiment, information about remote access
`device 15' may be stored at any one of memory 55, and
`memory associated with personal computer 25 or server 34.
`Remote access device 15 may have limited access to lock 11.
`By way of example, access may only be during predeter-
`mined time periods of a day, or for a limited number of times;
`such as a one-time use key. If the remote access device 15',
`represents a one-time key as determined in Step 131, this key
`will be deleted from the memory or stored in the memory of
`system 10 as an invalid key in Step 132 to prevent further
`access.
`
`As with touch process, in this proximity determination
`process at any time controller 21 or 32 determines that the
`response is inappropriate (Step 125), or remote access device
`15 is not a one-time key (131) the process is returned to Step
`100 to begin again. However, if the button has not been
`pressed in Step 128 then the process merely returns to rede-
`termining the location ofremote access device 15 in Step 127.
`A hybrid approach is also possible. In a Step 105, once it is
`determined that the lock has been touched in Step 102 and
`lock 11 listens for a broadcast from fob 15 in Step 103, if a
`lock 11 determines in a step 105 that a Smartphone connect-
`able advertisement response has been received within a pre-
`determined time window; five seconds or less in a preferred
`embodiment, the process continues for Smartphone 15' at
`Step 124 as described above. If the response is not appropri-
`ate, as determined Step 105, then the process returns to the
`beginning in Step 100.
`In another preferred non-limiting embodiment, the loca-
`tion and positioning algorithm performed in a Step 127 can
`utilize RSSI in formation from the lock 11 to the remote
`
`access device 15'. This can be done by the remote access
`device 15' receiving RSSI information from the lock 11 and
`transmitting this RSSI information back to the lock 11 to be
`processed by controller 21 for location and positioning pur-
`poses.
`In another preferred non-limiting embodiment, any unau-
`thorized user can lock the lock 11 by triggering the proximity
`detector three consecutive times within a predetermined time
`window such as discussed above in Step 106. In another
`possible embodiment, the lock 11 can be touched and held for
`greater than a predetermined time to lock the lock 11.
`In another preferred non-limiting embodiment, only
`remote access devices 15 looking for a unique advertisement
`from the lock 11 will respond with a connectable advertise-
`ment. In this way, the system can provide access control to
`many possible authorized devices without adding additional
`delays per additional authorized devices.
`In another embodiment in which the remote access device
`
`15' is a Smartphone, tablet, or

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket